Nmap Development mailing list archives

Nmap 4.23RC3 & SSL Tunnels


From: Lionel Cons <lionel.cons () cern ch>
Date: Tue, 4 Dec 2007 11:43:17 +0100

I've scanned the same machine with Nmap versions 4.20 and 4.23RC3 and
here is what gets reported:

Nmap 4.20
---------

443/tcp  open     ssl/http      Microsoft IIS webserver 6.0

<port protocol="tcp" portid="443"><state state="open" /><service name="http" product="Microsoft IIS webserver" 
version="6.0" ostype="Windows" tunnel="ssl" method="probed" conf="10" /></port>

Nmap 4.23RC3
------------

443/tcp  open     ssl           Microsoft IIS SSL

<port protocol="tcp" portid="443"><state state="open" reason="syn-ack" reason_ttl="124"/><service name="ssl" 
product="Microsoft IIS SSL" ostype="Windows" method="probed" conf="10" /></port>

So it seems that the new Nmap reports less information. It just
reports "ssl" without going further and finding what is behind the SSL
tunnel.

Is this expected?

I would really prefer to keep the old behaviour and detect what runs
behind SSL.

Cheers,

Lionel Cons

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: